>
Course Unit Title | Course Unit Code | Type of Course Unit | Level of Course Unit | Year of Study | Semester | ECTS Credits |
---|---|---|---|---|---|---|
Database Security and Privacy | BTM603 | Elective | Doctorate degree | 1 | Fall | 8 |
Associate Prof. Dr. Serdar SOLAK
Research Assistant M.M. Enes YURTSEVER
1) Students are able to design and implement access control rules to assign privileges and protect data in databases.
2) Students are able to implement access control rule to secure data stored in databases. They use Oracle and Microsoft SQL server.
3) Students implement Virtual Private Database to protect data in databases.
4) Students implement database auditing.
5) Students learn and practice various access control theories and techniques including mandatory access control, discretionary access control, role?based access control.
Program Competencies | ||||||||||||||
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | ||
Learning Outcomes | ||||||||||||||
1 | Middle | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | |
2 | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | |
3 | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | |
4 | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | |
5 | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation |
Face to Face
None
Advanced Data Analysis Tools and Techniques
Database security has a great impact on the design of today's information systems. This course will provide an overview of database security concepts and techniques and discuss new directions of database security in the context of Internet information management. The topics will cover database application security models, database and data auditing, XML access control, trust management and privacy protection.
1- Database Security and Auditing: Protecting Data Integrity and Accessibility, . ISBN: 0?619?21559?3
2- Implementing Database Security and Auditing, Elsevier digital press. ISBN: 1? 55558?334?2.
3- Information Security: An Integrated Collection of Essays, IEEE Computer Society Press
Turkish
Required